Journal of Machine and Computing


Blockchain Based Machine Learning Model for Secure Data Transfer and Route Preservation in UAV Integrated VANET Systems



Journal of Machine and Computing

Received On : 17 June 2025

Revised On : 28 July 2025

Accepted On : 03 August 2025

Published On : 05 October 2025

Volume 05, Issue 04

Pages : 2345-2360


Abstract


The rise of driver assistance and automotive telecommunication systems shows great potential for adaptive transport solutions using vehicular ad hoc networks (VANET). Generally, the two main issues in vehicle ad hoc networks that malicious attackers can greatly affect are privacy and safety. Preventing the spread of harmful messages among vehicles is crucial to protecting the private properties of automobiles from potential threats. This research tackles these issues and proposes a new machine-learning-based message authentication method. This method can be integrated with interplanetary file systems and blockchain to ensure secure message distribution. The Inter Planetary File System (IPFS) is utilized by blockchain technology to create tamper-proof records in a distributed environment. This protocol stores events using content addressing. The source metadata from the IPFS is first stored in a smart contract and then in the distributed ledger technology. This framework makes use of the Iterative Import Vector Machine (IIVM) classifier and Non-overlapped K-means clustering in the event authentication process. It will be classified as malicious or not malicious in order to carry out the vehicle clustering. After clustering, the IIVM classifier works to identify harmful event messages. As a result, dropped messages are recognized as such and the secure messages are sent into the network. According to simulation results, the suggested approach increases event spoofing identification precision by 96.21%. This system's trust model of the occurrence does an excellent task of separating genuine instances from fake ones.


Keywords


Blockchain, Over-Lapping, IIVM, Spoofing, Machine Learning and VANETs.


  1. H. Zhu, K.-V. Yuen, L. Mihaylova, and H. Leung, “Overview of Environment Perception for Intelligent Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 10, pp. 2584–2601, Oct. 2017, doi: 10.1109/tits.2017.2658662.
  2. M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, and S. Manickam, “Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks,” IEEE Sensors Journal, vol. 21, no. 2, pp. 2422–2433, Jan. 2021, doi: 10.1109/jsen.2020.3021731.
  3. F. Qu, Z. Wu, F. Wang, and W. Cho, “A Security and Privacy Review of VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 6, pp. 2985–2996, Dec. 2015, doi: 10.1109/tits.2015.2439292.
  4. R. P. Puneeth and G. Parthasarathy, “Blockchain-Based Framework for Privacy Preservation and Securing EHR with Patient-Centric Access Control,” Acta Informatica Pragensia, vol. 13, no. 1, pp. 1–23, Apr. 2024, doi: 10.18267/j.aip.225.
  5. S. Verma, S. Zeadally, S. Kaur, and A. K. Sharma, “Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 13473–13481, Aug. 2022, doi: 10.1109/tits.2021.3124730.
  6. A. A. Elkhail, R. U. D. Refat, R. Habre, A. Hafeez, A. Bacha, and H. Malik, “Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses,” IEEE Access, vol. 9, pp. 162401–162437, 2021, doi: 10.1109/access.2021.3130495.
  7. A. Yang, J. Weng, N. Cheng, J. Ni, X. Lin, and X. Shen, “DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation,” IEEE Transactions on Vehicular Technology, vol. 68, no. 5, pp. 4834–4845, May 2019, doi: 10.1109/tvt.2019.2905522.
  8. S. A. Jan, N. U. Amin, M. Othman, M. Ali, A. I. Umar, and A. Basir, “A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues,” IEEE Access, vol. 9, pp. 153701–153726, 2021, doi: 10.1109/access.2021.3125521.
  9. R. P. Puneeth and G. Parthasarathy, “A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology,” Computers and Electrical Engineering, vol. 120, p. 109676, Dec. 2024, doi: 10.1016/j.compeleceng.2024.109676.
  10. M. S. Alsayfi, M. Y. Dahab, F. E. Eassa, R. Salama, S. Haridi, and A. S. Al-Ghamdi, “Securing Real-Time Video Surveillance Data in Vehicular Cloud Computing: A Survey,” IEEE Access, vol. 10, pp. 51525–51547, 2022, doi: 10.1109/access.2022.3174554.
  11. S. Ribouh, K. Phan, A. V. Malawade, Y. Elhillali, A. Rivenq, and M. A. A. Faruque, “Channel State Information-Based Cryptographic Key Generation for Intelligent Transportation Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 12, pp. 7496–7507, Dec. 2021, doi: 10.1109/tits.2020.3003577.
  12. G. R. W. Thoms, R. Muresan, and A. Al-Dweik, “Chaotic Encryption Algorithm With Key Controlled Neural Networks for Intelligent Transportation Systems,” IEEE Access, vol. 7, pp. 158697–158709, 2019, doi: 10.1109/access.2019.2950007.
  13. H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Comments on ‘Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks,’” IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 7, pp. 2149–2151, Jul. 2018, doi: 10.1109/tits.2017.2746880.
  14. Z. Zhao, L. Guardalben, M. Karimzadeh, J. Silva, T. Braun, and S. Sargento, “Mobility Prediction-Assisted Over-the-Top Edge Prefetching for Hierarchical VANETs,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 8, pp. 1786–1801, Aug. 2018, doi: 10.1109/jsac.2018.2844681.
  15. C. Zhu, X. Zhu, J. Ren, and T. Qin, “Blockchain-Enabled Federated Learning for UAV Edge Computing Network: Issues and Solutions,” IEEE Access, vol. 10, pp. 56591–56610, 2022, doi: 10.1109/access.2022.3174865.
  16. Q. Li, Y. Tian, Y. Zhang, L. Shen, and J. Guo, “Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing,” IEEE Access, vol. 7, pp. 131534–131542, 2019, doi: 10.1109/access.2019.2939299.
  17. B. Li, R. Liang, D. Zhu, W. Chen, and Q. Lin, “Blockchain-Based Trust Management Model for Location Privacy Preserving in VANET,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3765–3775, Jun. 2021, doi: 10.1109/tits.2020.3035869.
  18. Parthasarathy, G., & Tomar, D. (2014). Optimized Prune Based Data Mining (Opbdm) For Distributed Databases: An Adaptive Approach. Journal of Theoretical & Applied Information Technology, 67(3) .
  19. R. Xu, C. Li, and J. Joshi, “Blockchain-based Transparency Framework for Privacy Preserving Third-party Services,” IEEE Transactions on Dependable and Secure Computing, pp. 1–1, 2022, doi: 10.1109/tdsc.2022.3179698.
  20. T. Liu, Y. Yang, G.-B. Huang, Y. K. Yeo, and Z. Lin, “Driver Distraction Detection Using Semi-Supervised Machine Learning,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1108–1120, Apr. 2016, doi: 10.1109/tits.2015.2496157.
  21. Virupakshappa MM. An efficient vehicle traffic maintenance using road side units in VANET. Imperial Journal of Interdisciplinary Research 2016; 3(2016): 783–784.
  22. S. Kim, “Impacts of Mobility on Performance of Blockchain in VANET,” IEEE Access, vol. 7, pp. 68646–68655, 2019, doi: 10.1109/access.2019.2918411.
  23. L. Zhang, J. Wang, and Y. Mu, “Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks,” IEEE Access, vol. 8, pp. 116781–116795, 2020, doi: 10.1109/access.2020.3004247.
  24. R. P. Puneeth and G. Parthasarathy, “Survey on Security and Interoperability of Electronic Health Record Sharing Using Blockchain Technology,” Acta Informatica Pragensia, vol. 12, no. 1, pp. 160–178, Apr. 2023, doi: 10.18267/j.aip.187.
  25. H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast Encryption Scheme for V2I Communication in VANETs,” IEEE Transactions on Vehicular Technology, vol. 71, no. 3, pp. 2749–2760, Mar. 2022, doi: 10.1109/tvt.2021.3113660.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Divya Sree A and Kapil Sharma; Writing- Original Draft Preparation: Divya Sree A and Kapil Sharma; Visualization: Divya Sree A; Investigation: Kapil Sharma; Supervision: Divya Sree A; Validation: Kapil Sharma; Writing- Reviewing and Editing: Divya Sree A and Kapil Sharma; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Author(s) thanks to Dr. Kapil Sharma for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Divya Sree A and Kapil Sharma, “Blockchain Based Machine Learning Model for Secure Data Transfer and Route Preservation in UAV Integrated VANET Systems”, Journal of Machine and Computing, vol.5, no.4, pp. 2345-2360, October 2025, doi: 10.53759/7669/jmc202505182.


Copyright


© 2025 Divya Sree A and Kapil Sharma. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.